sonatype-nexus-community/jake

[BUG] False positive for Plone and Zope versions

ewohnlich opened this issue · 1 comments

I believe these are false positives because the package version does not appear to be in the range described the result. I am assuming this is due to Jake and not OSSIndex, apologies if that is incorrect.

Zope deserves some explanation because it's a bit odd. Zope and Zope2 are two separate packages both used by Plone (the result of some decisions decades ago). I am not sure if it is mistakenly treating Zope2 as version 2.0.0 of Zope; that may be a red herring. For the Plone issue I don't even have a guess, it just says it is on version 6.0.9 but I am on 6.0.13.

[18/408] - Plone@6.0.13 [VULNERABLE]
Vulnerability Details for Plone@6.0.13
└── ⚠  ID: CVE-2024-22889
    └── ╭─ CVE-2024-22889 ─────────────────────────────────────────────────────╮
        │                                                                      │
        │ [CVE-2024-22889] CWE-497: Exposure of System Data to an Unauthorized │
        │ Control Sphere                                                       │
        │ Due to incorrect access control in Plone version v6.0.9, remote      │
        │ attackers can view and list all files hosted on the website via      │
        │ sending a crafted request.                                           │
        │                                                                      │
        │ Ratings:                                                             │
        │    -  7.5 HIGH - Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, CWEs:  │
        │ 497                                                                  │
        │                                                                      │
        │ References:                                                          │
        │   - OSS Index [Ref: CVE-2024-22889]                                  │
        │     URL:                                                             │
        │ https://ossindex.sonatype.org/vulnerability/CVE-2024-22889?component │
        │ -type=pypi&component-name=plone&utm_source=python-oss-index-lib%401. │
        │ 1.1&utm_medium=integration                                           │
        │                                                                      │
        ╰──────────────────────────────────────────────────────────────────────╯
[62/408] - Zope@5.10 [VULNERABLE]
Vulnerability Details for Zope@5.10
├── ⚠  ID: CVE-2000-1211
│   └── ╭─ CVE-2000-1211 ──────────────────────────────────────────────────────╮
│       │                                                                      │
│       │ [CVE-2000-1211] CWE-269: Improper Privilege Management               │
│       │ Zope 2.2.0 through 2.2.4 does not properly perform security          │
│       │ registration for legacy names of object constructors such as DTML    │
│       │ method objects, which could allow attackers to perform unauthorized  │
│       │ activities.                                                          │
│       │                                                                      │
│       │ Ratings:                                                             │
│       │    -  7.5 HIGH - Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P, CWEs: 269       │
│       │                                                                      │
│       │ References:                                                          │
│       │   - OSS Index [Ref: CVE-2000-1211]                                   │
│       │     URL:                                                             │
│       │ https://ossindex.sonatype.org/vulnerability/CVE-2000-1211?component- │
│       │ type=pypi&component-name=zope&utm_source=python-oss-index-lib%401.1. │
│       │ 1&utm_medium=integration                                             │
│       │                                                                      │
│       ╰──────────────────────────────────────────────────────────────────────╯
├── ⚠  ID: CVE-2000-1212
│   └── ╭─ CVE-2000-1212 ──────────────────────────────────────────────────────╮
│       │                                                                      │
│       │ [CVE-2000-1212] CWE-284: Improper Access Control                     │
│       │ Zope 2.2.0 through 2.2.4 does not properly protect a data updating   │
│       │ method on Image and File objects, which allows attackers with DTML   │
│       │ editing privileges to modify the raw data of these objects.          │
│       │                                                                      │
│       │ Ratings:                                                             │
│       │    -  5.0 MEDIUM - Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N, CWEs: 284     │
│       │                                                                      │
│       │ References:                                                          │
│       │   - OSS Index [Ref: CVE-2000-1212]                                   │
│       │     URL:                                                             │
│       │ https://ossindex.sonatype.org/vulnerability/CVE-2000-1212?component- │
│       │ type=pypi&component-name=zope&utm_source=python-oss-index-lib%401.1. │
│       │ 1&utm_medium=integration                                             │
│       │                                                                      │
│       ╰──────────────────────────────────────────────────────────────────────╯
└── ⚠  ID: CVE-2011-4924
    └── ╭─ CVE-2011-4924 ──────────────────────────────────────────────────────╮
        │                                                                      │
        │ [CVE-2011-4924] CWE-79: Improper Neutralization of Input During Web  │
        │ Page Generation ('Cross-site Scripting')                             │
        │ Cross-site scripting (XSS) vulnerability in Zope 2.8.x before        │
        │ 2.8.12, 2.9.x before 2.9.12, 2.10.x before 2.10.11, 2.11.x before    │
        │ 2.11.6, and 2.12.x before 2.12.3, 3.1.1 through 3.4.1. allows remote │
        │ attackers to inject arbitrary web script or HTML via vectors related │
        │ to the way error messages perform sanitization. NOTE: this issue     │
        │ exists because of an incomplete fix for CVE-2010-1104                │
        │                                                                      │
        │ Sonatype's research suggests that this CVE's details differ from     │
        │ those defined at NVD. See                                            │
        │ https://ossindex.sonatype.org/vulnerability/CVE-2011-4924 for        │
        │ details                                                              │
        │                                                                      │
        │ Ratings:                                                             │
        │    -  6.1 MEDIUM - Vector: AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,      │
        │ CWEs: 79                                                             │
        │                                                                      │
        │ References:                                                          │
        │   - OSS Index [Ref: CVE-2011-4924]                                   │
        │     URL:                                                             │
        │ https://ossindex.sonatype.org/vulnerability/CVE-2011-4924?component- │
        │ type=pypi&component-name=zope&utm_source=python-oss-index-lib%401.1. │
        │ 1&utm_medium=integration                                             │
        │                                                                      │
        ╰──────────────────────────────────────────────────────────────────────╯
[63/408] - Zope2@4.0 [VULNERABLE]
Vulnerability Details for Zope2@4.0
├── ⚠  ID: CVE-2000-1211
│   └── ╭─ CVE-2000-1211 ──────────────────────────────────────────────────────╮
│       │                                                                      │
│       │ [CVE-2000-1211] CWE-269: Improper Privilege Management               │
│       │ Zope 2.2.0 through 2.2.4 does not properly perform security          │
│       │ registration for legacy names of object constructors such as DTML    │
│       │ method objects, which could allow attackers to perform unauthorized  │
│       │ activities.                                                          │
│       │                                                                      │
│       │ Ratings:                                                             │
│       │    -  7.5 HIGH - Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P, CWEs: 269       │
│       │                                                                      │
│       │ References:                                                          │
│       │   - OSS Index [Ref: CVE-2000-1211]                                   │
│       │     URL:                                                             │
│       │ https://ossindex.sonatype.org/vulnerability/CVE-2000-1211?component- │
│       │ type=pypi&component-name=zope2&utm_source=python-oss-index-lib%401.1 │
│       │ .1&utm_medium=integration                                            │
│       │                                                                      │
│       ╰──────────────────────────────────────────────────────────────────────╯
├── ⚠  ID: CVE-2000-1212
│   └── ╭─ CVE-2000-1212 ──────────────────────────────────────────────────────╮
│       │                                                                      │
│       │ [CVE-2000-1212] CWE-284: Improper Access Control                     │
│       │ Zope 2.2.0 through 2.2.4 does not properly protect a data updating   │
│       │ method on Image and File objects, which allows attackers with DTML   │
│       │ editing privileges to modify the raw data of these objects.          │
│       │                                                                      │
│       │ Ratings:                                                             │
│       │    -  5.0 MEDIUM - Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N, CWEs: 284     │
│       │                                                                      │
│       │ References:                                                          │
│       │   - OSS Index [Ref: CVE-2000-1212]                                   │
│       │     URL:                                                             │
│       │ https://ossindex.sonatype.org/vulnerability/CVE-2000-1212?component- │
│       │ type=pypi&component-name=zope2&utm_source=python-oss-index-lib%401.1 │
│       │ .1&utm_medium=integration                                            │
│       │                                                                      │
│       ╰──────────────────────────────────────────────────────────────────────╯
└── ⚠  ID: CVE-2015-7293
    └── ╭─ CVE-2015-7293 ──────────────────────────────────────────────────────╮
        │                                                                      │
        │ [CVE-2015-7293] CWE-352: Cross-Site Request Forgery (CSRF)           │
        │ Zope - Multiple CSRF Vulnerabilities in Zope as ZMI is mostly        │
        │ unprotected from CSRF vulnerabilities                                │
        │                                                                      │
        │ The web application does not, or can not, sufficiently verify        │
        │ whether a well-formed, valid, consistent request was intentionally   │
        │ provided by the user who submitted the request.                      │
        │                                                                      │
        │ Ratings:                                                             │
        │    -  8.8 HIGH - Vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, CWEs:  │
        │ 352                                                                  │
        │                                                                      │
        │ References:                                                          │
        │   - OSS Index [Ref: CVE-2015-7293]                                   │
        │     URL:                                                             │
        │ https://ossindex.sonatype.org/vulnerability/CVE-2015-7293?component- │
        │ type=pypi&component-name=zope2&utm_source=python-oss-index-lib%401.1 │
        │ .1&utm_medium=integration                                            │
        │                                                                      │
        ╰──────────────────────────────────────────────────────────────────────╯

Thanks for your ticket @ewohnlich.

I can confirm this is not a bug in jake and that the above data is coming from OSS Index.

If you're interested in why that is in Sonatype's data, you'd have to be a Customer and engage with Sonatype Customer Support.

Thanks!